Path: number1.nntp.dca.giganews.com!local01.nntp.dca.giganews.com!nntp.adelphia.com!news.adelphia.com.POSTED!not-for-mail
NNTP-Posting-Date: Sat, 07 Jan 2006 20:19:49 -0600
Newsgroups: fidonet.os2
From: Sean_Dennis@f200.n18.z1
Date: Tue, 03 Jan 2006 11:13:32 -0500
Subject: Re: Networking issue
Message-ID:
References:
Organization: Outpost BBS - bbs.outpostbbs.net
3000
365/3253
Lines: 26
NNTP-Posting-Host: 24.54.66.112
properly
Xref: number1.nntp.dca.giganews.com fidonet.os2:41
Mike,
*** Quoting Mike Luther from a message to Rich Wonneberger ***
ML> From bitter experience here. NetBios over TCP/IP, under some
ML> circumstances, can open up a rare, but sure there way to invade even
ML> an OS/2 system for virus problems. At the time I first got bit by
Leaving your NetBIOS port open is like leaving your door open with "Thieves
?welcome!" sign hanging over the door. It's actually pretty easy to break into
?a LAN via NetBIOS over TCP/IP when there's no firewall. But at least you
?learned about firewalls. :)
I have been running my systems on a firewalled LAN for about six years now,
?wide open on full-time cable and DSL connections, with zero problems. All you
?have to do is tell them to go away and you're fine. ;)
If need be, I'll configure the built-in OS/2 firewall and run things (that's
?just as good) for the BBS. However, I've found it much easier to have a
?hardware firewall/router than a software one.
Later,
Sean
// sean@outpostbbs.net | http://outpostbbs.net | ICQ: 19965647
|